Install Kali Linux NMAP Scanning

Linux System Administration Nmap Scanning Kali Linux

KVM VPS Hosting AdvertisementKVM VPS Unlimited Bandwidth

KVM VPS Hosting with KVM VPS Unlimited Bandwidth, KVM virtual private server hosting starting at only $30 a month. Cheap KVM Hosting up to 6 Cores @ 2.83Ghz, 12GB Memory, 1TB RAID-10 with Unlimited Bandwidth.

Linux System Administration Nmap Scanning

Are you a system or network administrator? Than you need to learn to protect yourself from any possible threats that you may face! The first step in seeing if your server or vps is protected is first do an NMAP Scan of your server and see which ports are open.

If you currently do not have a firewall for blocking ports from outside world you can use CSF LFD which is a very good firewall and login intrusion detection system, you can also set CSF Regex for protecting from WordPress BruteForce Attacks and WordPress XMLRPC Attacks and CSF LFD has so many features and plus it uses IPSETs right out of the box if you with to use IPSETs instead of iptables.

Okay, lets get started with linux system administration nmap scanning. You will need to install Kali Linux. you can also install NMAP Scanning tools on any Linux or Windows computers, there are several ways to do this but my favorite is to run kali linux in virtualbox which is a free virtualization platform.

Download VirtualBox, compabile with mac, windows and linux.
https://www.virtualbox.org/wiki/Downloads

Once you’ve installed virtualbox now you need to download kali linux. they have a great facebook community so liking them on facebook is a must, they always post new tutorials so it’s a perfect place to advance your system penetration testing skills to learn how to protect yourself.

Download Kali Linux

Install Kali Linux in VirtualBox to Protect your Web server from Cyber Threats Port Scan

Linux System Administration Nmap Scanning is a must use, Install Kali Linux in VirtualBox to protect your web server from Cyber threats.

When you download kali linux change the ISO type to: “vmware”, once you install virtualbox click on new and change type to: “linux” and then version to: Debian “only choose Debian 64 bit if you downloaded the 64 bit kali linux and your host machine supports 64 bit guest virtualization”

It’s linux so you should only need to give it 512mb of ram, should be more than enough. unzip the downloaded kali linux “kali-linux-1.0-i386-gnome-vm.tar.gz” now choose under hardware “Use an exisiting virtual hard drive file” and navigate to the unzipped directory “kali-linux-1.0-i386-gnome-vm” and click create and now run kali linux.

kali linux virtual box

Installing kali linux virtual box

 

virtualbox choosing kali linux vmware

virtualbox choosing kali linux vmware

Okay, now start VirtualBox and when asked for login, click on Other and than type this:

Login: root

Pass: toor

 

Now go to “Applications – Kali Linux – Top 10 Security Tools – nmap. it will open a terminal for you and type in which ever network or server you wish to scan.

 

kali-nmap

 

Now you have nmap open in terminal.

Remember, scan on your own computers / servers / networks. I will just cover the basic of nmap scanning here and how to pipe it to a file for later review.

Type: nmap -v -A 192.168.0.30 “your own network or server IP”

Type: nmap -v -A subdomain.yourdomain.com “to scan a network or server using a fully qualified domain name.

To pipe it to a file for later review type:

nmap -v -A 192.168.0.30 >> /tmp/nmap-log

Of course change the IP Address above unless you’re scanning a device on your internal network.

nmap -v -A subdomain.yourdomain.com >> /tmp/nmap-log

When you’re scanning or attacking your servers always have a couple terminals open connected to your server or vps for you can see what a port scan on your server / vps would look like. also have these runnning on your server or vps.

tail -f /var/log/messages
tail -f /var/log/secure

You can tail -f multiple log files at same time, no need for multiple windows

tail -f /var/log/messages /var/log/secure

and all your other log files depends on yourlinux distro.

These terminal commands are a must:

last = shows successful login, ip and time, shows logged in etc.

lastb = shows failed password attempts
top = good to see which processes are using the most resources, etc

htop = you can download htop, it’s a lot better than top

w = shows all logged in users and what ip address they’re coming from.

users = Will also show logged in users, but won’t give much information.

You can do use piping to display just the stuff you want or more command to use spacebar to show more.

cat /var/log/secure | grep ftp

if you want to display with spacebar to show more you can use.

cat /var/log/secure | grep ftp | more

cat /var/log/secure | grep ftp | grep Login successful

cat /var/log/secure | grep ftp | grep “Login successful”

If you have a huge list you can use the more command to hit sparebar to show more.

cat /var/log/secure | grep ftp | grep “Login successful” | more

This is my tutorial on the basics of running nmap on Kali Linux. I will not go through all the features of Kali Linux, but any one wanting to learn more about it the first place to start is learning how to actually scan for open ports. Kali Linux is a very powerful OS and includes a lot of pentesting tools already builtin, so you don’t have to hunt down them. Some tools which I won’t name you’ll have to download and install, and going through and learning how the tools work is a great learning experience because you have to get all the services to work together. If you’re new at linux I highly recommend they have Kali Linux as their main computer or on their laptop which I keep Kali Linux on my laptop for doing jobs, but it has so many tools you can use it for all your IT work. I hope you have a wonderful day and please stay out of trouble.

 Computer Repair Sarasota

By Lee Claxton

Alpha Computer and Web Services

5439 Sawgrass RD, Sarasota FL 34232

941-539-9680

Shared Web Hosting Packages | Unmanaged Dedicated Server Rental |  Managed Dedicated Server Hosting